Java
-
ThreadLocal source code analysis – java8
1. Characteristic analysis Threadlocalhashcode describes a custom hash value (valid only in threadlocalmaps), which el…… -
Abstractset source code analysis – java8
< H4 id = "13 methods" > 1.3 methods < H4 id = "2ash value" > 2 Hash value Hash = sum (hash value of each …… -
Java8 Stream
summary A new abstraction called stream has been added to the Java 8 API to process data in a declarative manner. Stre…… -
RMI underlying implementation principle
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Why use the rest style? If you don’t use rest, how should the interface be defined? How do you write the interface before using the rest style?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Enumeration
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Java object-oriented —- polymorphism summary
1. Polymorphism: the ability of the same behavior to have multiple different forms or forms. 3. Three necessary condit…… -
How does return in try, catch and finally affect the word order of code execution
1. If there is no return statement in try, catch and finally, the normal execution sequence is as follows: After the n…… -
What is session? What is a cookie? What is the difference between session and cookie? What scenarios apply to sessions? What scenarios apply to cookies?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
HashMap analysis
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
LinkedHashMap source code analysis of Java collection
summary HashMap is out of order, that is, the put order is not guaranteed to be the same as the traversal order Linked…… -
Summary of design patterns involved in JDK
All design patterns have found an implementation in JDK (not all are listed, because there are too many reasons, and t…… -
Why is the capacity of HashMap power of 2 and what is the load factor
Transferred from: When I was preparing for a job interview, I often had such an interview question in my face: "why i…… -
Briefly describe the direction of this in JS
This is the front-end small class of the Xiuzhen Academy. Each shared article is from [background introduction] [knowl…… -
How to call a third-party API to upload pictures.
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Java 8 default method
summary Java 8 adds default methods for interfaces. Use the default keyword. The default method is that the interface …… -
Java high concurrency solution
< P style = "margin top: 0px; margin bottom: 0.75em; padding top: 0px; padding bottom: 0px; font size: 16px; line h…… -
Exchange source code analysis – java8
1. Characteristic analysis package sourcecode. analysis; import java.util.concurrent.Exchanger; import java.ut…… -
Java data type and MySQL data type correspondence table
Transferred from: nofollow "> http://www.cnblogs.com/JemBai/archive/2009/08/20/1550683.html -
Shrio framework
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Primary key & unique
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
What are the disadvantages of self increasing ID? What kind of scenario does not use self incrementing ID?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Xiuzhen academy Java task 1 whole process introduction
For a long time, the task of the monastery has been jokingly called "dissuasion task". Task 1 portal: After completing…… -
Why use log4j instead of system out. println?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Difference between shift right operator > > and > > >
Transferred from: nofollow "> http://blog.csdn.net/maggiemiaomiao/article/details/49763649 1. > > > is an…… -
What is consistency hash and what problems are usually used to solve?
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Are java training institutions reliable?
First. Don't go to a training institution that teachers have been talking about. These teachers haven't written code t…… -
Mybatis generation strategy
This is the back-end small class of the monastery. Each article is shared from [background introduction] [knowledge an…… -
Exception: call from * 9000 failed on connection exception: Java net. ConnectException: Connection refused: no further information; For more details see: http://wiki.apache.org/hadoop/ConnectionRefused
Scenario: Eclipse cannot be linked to alicloud Hadoop solution: Change the IP in the Hadoop configuration file to the ……